Eliminate internal and external threats through a Cyber Operations:
• Anticipation – Understanding existing vulnerabilities and emerging threats to develop proactive contingency plans for responding in network time—seconds and minutes—to a cyber-event.
• Awarness – Implementing automated systems and processes to provide a complete, accurate, real-time understanding of the health and status of networks.
• Action – Initiating response plans to anomalies and attacks by coordinating activities to achieve a unified, dynamic network defense that minimizes the impact and facilitates rapid recovery.
• After Action – Determining what happened, who did it, how they did it, and incorporating the lessons learned.
In order to IDENTIFY, PROTECT, DETECT, RESPOND, and RECOVER from a Cyber-attack. This model provides a high-level, strategic view of the lifecycle of an organization’s management of cybersecurity risk using:
USING: TECHNOLOGY, SERVICES, AND PROCESSES